Tag Archives: Touch ID

iOS 11 Has A New Secret Ability To Quickly Disable Touch ID

Apple just released iOS 11, and hidden amongst its many new features is a new secret ability to quickly disable Touch ID. We will share with you the details of this new feature, and why you should learn how to use it.


How To Quickly Disable Touch ID

Note : This method only works with iOS 11. If you are using an older iPhone, you must upgrade to iOS 11 first.

To quickly disable Touch ID, rapidly tap the Power button five times.

This temporarily disables Touch ID, and displays the Emergency Services screen, where you can dial 911 / 999 without unlocking the iPhone.

Touch ID is disabled only until you enter your Passcode. Authenticating yourself using the Passcode re-enables Touch ID.

This new method beats the previous methods that include using five different fingers on Touch ID to lock it out, or disabling it in the settings.


Why Should You Learn How To Disable Touch ID?

[adrotate group=”2″]

Everyone should learn how to use this method to quickly disable Touch ID. Why?

First of all, it is a great security feature. It prevents someone from forcibly using your fingerprint to gain access to your iPhone.

The most obvious candidates of such a dastardly act would be oppressive governments and law enforcement officers who don’t care for civil rights. But it could also be a robber or a suspicious spouse.

If you can quickly disable Touch ID, they will need you to key in your Passcode. No amount of forcing you to touch your fingers against the Touch ID sensor will gain them access to your iPhone.

Go Back To > Articles | Home


Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Killer Features In 2016 MacBook Pro Models Confirmed

Apple is gearing up for a refresh of their 13″ and 15″ MacBook Pro models in Q4 of 2016, probably around September. In addition to the usual processor and graphics upgrades, Apple is looking to inject a little pizazz in the 2016 MacBook Pro models.

We have just confirmed with an internal Apple source, who has direct or working contact with the upcoming 2016 MacBook Pro models, that they will definitely come with two killer features – an OLED display touch bar, and a Touch ID fingerprint sensor.


OLED Display Touch Bar

The OLED display touch bar will run along the top of the keyboard, replacing the physical function keys. It will have full colour capability, and will be fully customisable by the user. Amongst other things, users can add a “Do Not Disturb” button, or switch it to a dark “Night Mode” colour scheme.

Our source will not (currently) send us pictures of the actual OLED display touch bar, but designer Martin Hajek came up with concept renderings of what he thinks the OLED display touch bar could look like. Check them out :

[adrotate banner=”5″]


Touch ID Fingerprint Sensor

The 2016 MacBook Pro models will also come with a Touch ID fingerprint sensor. This will be used not just for user authentication, it will also be used to authorise payments via Apple Pay.

Our source is currently unwilling to share any additional details, or pictures, of the Touch ID fingerprint sensors. However, TheAlienPebble proposed that the entire glass trackpad may serve as a giant Touch ID sensor.

This would cost a lot more than a small sensor, but it would allow for multi-finger authentication, and active user authentication.

Multi-finger authentication would allow for much better security. You can use a combination of multiple fingers, to add an additional layer of complexity. Yet it is a simple concept to grasp and use all the time.

The same goes for active user authentication. With the entire touchpad functioning as a giant biometric sensor, the 2016 MacBook Pro can lock itself down if it detects someone other than the authorised (and logged-in) user using the touchpad.


What Else Is New In The 2016 MacBook Pro?

[adrotate banner=”4″]

The “less sexy” upgrades that we are looking forward to in the 2016 MacBook Pro models include :

  • faster 7th Generation Intel Core (Kaby Lake) processor options
  • faster Intel Iris Graphics or NVIDIA GeForce GPU options
  • new metal injection-moulded hinges
  • USB 3.1 Type C and Thunderbolt 3 ports
  • slimmer and lighter chassis


Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participate in the Tech ARP Forums, or even donate to our fund. Any help you can render is greatly appreciated!

SoFlo iPhone Unlocking Hoax Debunked

A video published by SoFlo (Antonio Lievano), a notorious Facebook content thief, has gone viral after it mocked the FBI for not knowing how to gain entry into a locked iPhone. In the video, SoFloAntonio demonstrated how anyone can gain entry into a locked Apple iPhone without knowing the password. We will debunk the SoFlo iPhone unlocking video, and show you how he scammed you.

Updated @ 2016-03-07 : Added a proof video demonstrating that the hack is a hoax on two different Apple iPhones, and added a page detailing the Siri bug that the hoax is based on, as well as its relevance to the FBI.

Updated @ 2016-03-10 : SoFlo Antonio removed his video suddenly at around 12:50 AM (GMT+8), wiping out millions of views and over a million shares. We also added a new “Touch ID & Assistive Touch” section in Page 2.

Updated @ 2016-03-11 : It appears that the video is now up again, but shifted to the official SoFlo account, instead of SoFlo Antonio’s account. It’s amazing how much power Facebook gives SoFlo.


Debunking The SoFlo iPhone Unlocking Hoax

SoFlo / Antonio Lievano used a common magician’s trick to fool you into thinking he actually unlocked an Apple iPhone without knowing the passcode – misdirection.

To figure out how he did it, you must first understand that you do NOT actually need to key in the passcode to get into an Apple iPhone, particularly if it is your own iPhone. All you really need is an Apple iPhone with the Touch ID fingerprint recognition feature (first introduced in the Apple iPhone 5s). 😀

Watch this video that we specially prepared to show you how and where he misdirected you into thinking he found an easy way to get past the iPhone’s passcode security :

So now you know how he tricked you. He didn’t do anything but activate the iPhone’s Touch ID right at the start. This allowed him to access the Photos app and get out into the Home screen.

If you disable Touch ID, or just press on the Home button with the end of a pen, you will NEVER get into the Photos app, or out into the Home screen. In fact, you will not even be able to share the “soflo” clock you created (0:37 in the video).

His mocking of the FBI, however, was a marketing masterstroke. It got all of you to share and make his fake video viral. Who doesn’t want to show the world how stupid the FBI really is? So you share it out without thinking twice. Now who looks like the idiot here? 😀

Instead of sharing his FAKE video, why not share our video instead? We guarantee you will look SMARTER than your friends who shared SoFlo’s video! 😀

[adrotate banner=”5″]


Our Debunking Proof Video New!

Ever since we posted the debunking video, we received claims by a number of people who claimed to have successfully performed the hack. Some even questioned whether we tested it out before claiming SoFlo was trolling us with another hoax. Let us address that once and for all.

First of all, we fully tested and investigated his methodology before we even spent time creating the video. That’s why it took us a while to create our video after the SoFlo video was flagged to us for investigation. Even then, we continued to try on the two Apple iPhones we have here, to no avail. We even enlisted our friends to test their iPhones.

But as they say – talk is cheap. In this video, we will show you what we have been doing using the Apple iPhone 6 and Apple iPhone 5C (internally the same as the Apple iPhone 5). We will also show you how it is only possible to replicate SoFlo’s “hack” using Touch ID. Check it out…

Please note that we are not saying that those who successfully followed SoFlo’s “hack” are liars. In fact, we will now explain to you how some people are successfully doing it, and why SoFlo’s method is still wrong.

This explanation is a bit long, so we have to shift it to the second page. Head on over if you are interested to learn more about why the SoFlo iPhone unlocking hack is a hoax.

Next Page > iOS 9 Siri Bug, Relevance To The FBI


Support Tech ARP!

If you like our work, you can help support out work by visiting our sponsors, participate in the Tech ARP Forums, or even donate to our fund. Any help you can render is greatly appreciated!

iOS 9 Siri Bug

The source of SoFlo’s iPhone unlocking hack is really the iOS 9 Siri bug that was revealed right after iOS 9 was released on September 16, 2015. Here are the steps to exploit that bug :

  • [adrotate banner=”4″]In the Lock screen, key in an incorrect passcode a few times.
  • On the last attempt, invoke Siri immediately.
  • Ask Siri for the time, and click to add a new Clock.
  • Type in a random word in the Choose a City search field.
  • Select the random word and Share it as a Message.
  • Once in the Message app, you can access the entire Photo Library.
  • You can also select Create New Contact to access the Contact List.

Note the initial step of keying in an incorrect passcode a few times. It is this initial step that is (likely) allowing some users to successfully replicate the exploit. SoFlo did not mention that in his video. So even if we assume he was using an iOS 9 device, how did he even exploit the bug?

More importantly, the iOS 9 Siri bug only allows you to access the device’s Photo Library and Contact List. It does NOT allow you to go to the Home screen, and basically access the device in its entirety. Yet SoFlo demonstrated that his hack allows him to access the Home screen. How is that possible?

The simplest explanation is that SoFlo didn’t actually hack the iPhone. As we demonstrated in our proof video, triggering Touch ID is the only guaranteed way to properly replicate everything he did.


Touch ID & Assistive Touch New!

If you watch our proof video carefully, you will note that we not only used the pen to trigger Siri, we also used it to get out to the Home screen. This is because Touch ID is active AT ALL TIMES. In one instance, we chose to use the Assistive Touch shortcut, instead of the physical Home button. We did this to avoid activating Touch ID.

In other words, those of you who may have taken the precaution of calling Siri using a pen, or with your finger covered with cloth, may have activated Touch ID anyway when you pressed on the Home button later in the “hack”. To be sure you are not activating Touch ID, either disable it completely, or use a pen to press on the Home button at all times, or use Assistive Touch.


Relevance To The FBI

SoFlo’s mocking of the FBI is deliberately designed to trick you into making his hoax video go viral. Who would pass up a chance to thumb their noses at the FBI? 😀

But let’s consider the likelihood that the iOS 9 Siri bug would be of any use to the FBI, in their efforts to gain access into the Apple iPhone 5C (the same model we used in our proof video) used by one of the two shooters in the 2015 San Bernardino attack.

This bug was fixed in iOS 9.0.1, released just one week later on September 23, 2015. The San Bernardino attack happened on December 2, 2015. It is more than likely that the Apple iPhone 5C used had already been patched. By December 2, Apple had already released 2 minor updates and one major update :

  • iOS 9.0.1 – September 23, 2015
  • iOS 9.0.2 – September 30, 2015
  • iOS 9.1 – October 21, 2015

We do not have any information on the exact iOS version the San Bernardino iPhone 5C is using. But considering the efforts the FBI have gone into forcing Apple into installing an exploit to gain access to that device, it has likely been patched against the iOS 9 Siri bug. Needless to say, the exploit will not work if Siri was disabled.

Incidentally, if SoFlo actually discovered an exploit that actually unlocked an iPhone without the passcode or Touch ID, he would have taken it to the FBI. The publicity he would have earned from that act would be worth far, FAR more than spreading a viral video.

Think about it.

[adrotate banner=”5″]


Support Tech ARP!

If you like our work, you can help support out work by visiting our sponsors, participate in the Tech ARP Forums, or even donate to our fund. Any help you can render is greatly appreciated!